The BYOD Security Dilemma
March 29, 2012
A summary of the report lists several questions IT should ask when formulating their policy:
•How do you comply with regulations on records retention and destruction in a BYOD environment?
•How should a device be configured to receive and transmit corporate data?
•What happens to data and its audit trail when an employee leaves the company?
•What type of passwords should be used?
•What kind of encryption standard should be required?
There are security tools out on the market that address some of these concerns, such as the capability to connect a smartphone to the corporate network using virtual private network (VPN) technology.
Also, VMware introduced a technology called Horizon Mobile, which essentially runs a smartphone as a virtual instance within an employee’s personal smartphone. The product is going to become available in the second quarter of 2012, says Steve Herrod, chief technology officer at VMware.
Learn more about Fundamentals: 5 Options for Mobile App Development by subscribing to Network Computing Pro Reports (free, registration required).